Hi Kelley,
Thanks for the answers. Some followup questions/comments below.

Burgin, Kelley W. wrote:

Thank you for the review. Comments inline below, noted with [kwb].

Kelley

-----Original Message-----
From: Alexey Melnikov [mailto:[email protected]] Sent: Friday, June 17, 2011 6:21 PM
To: [email protected]
Cc: [email protected]; [email protected]
Subject: [Gen-art] Gen-Art Last Call Review:
draft-burgin-ipsec-suiteb-profile-00

I am the assigned Gen-ART reviewer for this draft. For background on
Gen-ART, please see the FAQ at
<http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>.

Please resolve these comments along with any other Last Call comments
you may receive.

Document: draft-burgin-ipsec-suiteb-profile-00
Reviewer: Alexey Melnikov
Review Date: 17-June-2011
IETF LC End Date: 13-July-2011
IESG Telechat

Summary: not ready, but issues are not difficult to address

Major issues:

4.3.  Suite B IKEv2 Authentication

   If configured at a minimum level of security of 128 bits, a system
   MUST use either ECDSA-256 or ECDSA-384 for IKE authentication.  It
   is allowable for one party to authenticate with ECDSA-256 and the
   other party to authenticate with ECDSA-384.  This flexibility will
   allow interoperability between an initiator and a responder that
   have different sizes of ECDSA authentication keys.

   Initiators and responders in a system configured at a minimum level
   of security of 128 bits MUST be able to verify ECDSA-256 signatures
   and SHOULD be able to verify ECDSA-384 signatures.

The last SHOULD seems to mean that at the minimum level of security of 128 bits it is possible to have a situation when a responder might be unable
to verify ECDSA-384 signatures used by an initiator.

Is this truly desirable?

[kwb] Would we like minLOS_128 devices to be able to also support the
192 bit sure, but there might be cases where they simply can't. That's
why it's a SHOULD and not a MUST.

How are you planning to achieve interoperability if one endpoint can use a mechanism which the other end is not required to support?

5.  Suite B Security Associations (SAs) for IKEv2 and IPsec

   An initiator in a system configured at a minimum level of security
   of 128 bits MUST offer one or more of the four suites:
   Suite-B-GCM-128, Suite-B-GMAC-128, Suite-B-GCM-256 or
   Suite-B-GMAC-256 [RFC4869bis].  Suite-B-GCM-128 and
   Suite-B-GMAC-128, if offered, must appear in the IKEv2 and IPsec SA
   payloads before any offerings of Suite-B-GCM-256 and
   Suite-B-GMAC-256.

Does this mean that the responder needs to support all 4?
I think it does (or otherwise there is a chance of non
interoperability),
but it would be better to state that explicitly.

[kwb] I will add "A responder configured in a system at a minimum level
of security of 128 bits MUST support Suite-B-GCM-128 and
Suite-B-GMAC-128 and SHOULD support Suite-B-GCM-256 and
Suite-B-GMAC-256." To the beginning of the following paragraph.
This is going to have the same interop issue as above.

   A responder configured in a system at a minimum level of security
   of 128 bits SHOULD accept the first Suite B UI suite offered by the

Is this a new requirement in this document, or is this repeating a general requirement stated in another document? If the latter, a reference is needed here, ideally accompanied by some text stating that the requirement comes from another document.

Similar text later in the same section.

   initiator that it can accommodate.  If none of the four suites are
   offered, the responder MUST return a Notify payload with the error
   "NO_PROPOSAL_CHOSEN".

[kwb] These are new, so no reference is given.
Why is this a SHOULD and not a MUST, i.e. what are the possible reasons for not selecting the first offered mechanism?

8.  Additional Requirements

   Suite B IPsec compliant systems MUST support IKEv2 and MUST NOT use
   IKEv1.  However, to accommodate backward compatibility, a Suite B
   IPsec compliant system can be configured to use IKEv1 so long as
only
   IKEv2 is used between a Suite B compliant initiator and responder.

You lost me here. Can you please explain what is the meaning of
the second sentence?

[kwb] This means that the box can talk both IKEv1 and IKEv2 but when
they're talking in "Suite B mode" they can't use IKEv1.

I suggest you rephrase the 2 sentences to say exactly that. I found the current text to be unclear.

   The administrative user interface, (UI), for a system that conforms
   to this profile MUST allow the operator to specify a single suite.
   If only one suite is specified in the administrative UI, the IKEv2
   implementation MUST only offer algorithms for that one suite.

This requirement is unusual, because IETF documents rarely have requirements on UIs. Can you please elaborate what is this trying to achieve?

[kwb] It is unusual, but the accompanying draft
(draft-law-rfc4869bis-01) defines Suite B User Interface suites (the
term UI is from RFC 4308) that this draft refers to so this seems like
the appropriate term. From RFC 4308: "These suites may be presented in
the administrative interface of the IPsec system."

Ok.

Minor issues:

3.  Suite B Requirements

      Curve        NIST name       SECG name   IANA assigned DH group #
      -----------------------------------------------------------------
      P-256       nistp256        secp256r1               19
      P-384       nistp384        secp384r1               20

This doesn't tell where to look for the IANA assigned DH group.
An Informative reference would be nice.

[kwb] Will add "IANA has already registered these DH groups in
[IKEV2IANA]." after the table, and add to Informative References:
[IKEV2IANA] "Internet Key Exchange Version 2 (IKEv2) Parameters",
<http://www.iana.org>.

Thanks.

10.  IANA Considerations

   TBD.

I think this needs to be replaced with a statement saying that this document doesn't require any new actions from IANA, because all algorithm are already registered in RFCs referenced by this document.

[kwb] Will replace "TBD" with "None."

idnits 2.12.12 reports:

  Miscellaneous warnings:

------------------------------------------------------------------------
----

  -- The document has a disclaimer for pre-RFC5378 work, but was first
     submitted on or after 10 November 2008.  Does it really need the
     disclaimer?

Please double check that that is intentional.

[kwb] This is intentional since this draft uses text from documents
published before 10 November 2008.
Thanks for checking.

Nits/editorial comments:

7.  Generating Keying Material for the IKE SA

   IKEv2, [RFC5996], allows for the reuse of Diffie-Hellman ephemeral
   keys. Section 5.6.4.3 of NIST SP800-56A states that an ephemeral
   private key MUST be used in exactly one key establishment
   transaction and MUST be zeroized after its use.

Is "zeroized" a correct verb?

[kwb] The terms zeroize, zeroized, zeroizing are used in security
standards (e.g., RFCs 1319-1321, 4949).

Ok then :-).

_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to